Password a false sense of security

The next time you have to create a password (), with uppercase and lowercase combinations, numbers and symbols, do not think you are safe.

PasswordΟ Randy Abrams, ανώτερος αναλυτής στην Webroot, πραγματοποίησε some simple tests. Count all possible passwords you can create with eight characters, numbers, uppercase and lowercase letters and symbols.

He found that 95 ^ 8 possible combinations can be made (26 uppercase + 26 lowercase + 10 numbers + 33 symbols = 95 characters), which are 6.634.204.312.890.625 codes.

Now suppose someone tries to find your code with a standard brute-force attack. Guess they can try about 31 billion passwords per second. So the code breaking we mentioned above can be done, at most 212,903 , or 3.548 minutes, or about two and a half days.

Now, let's talk about the limitations. Let's say a service you use apand have an eight-character code.

Abrams reports that there are 70,6 trillion with 8 letters. This saves the brute-force attack 2,277 seconds, or almost 38 minutes.

But what if, at της ασφάλειας, χρησιμοποιείτε έναν κωδικό οκτώ χαρακτήρων (για να τον θυμάστε) και μια υπηρεσία σας αναγκάζει να χρησιμοποιήσετε μόνο κεφαλαία γράμματα αλλά και σύμβολα. Είναι πιο ασφαλές έτσι; Είναι ένας πιο σύνθετος κωδικός πρόσβασης, ο οποίος δυσκολεύει τον αποκωδικοποιητή; ΟΧΙ ακριβώς.

According to Abrams, you just cut 18,5 percent from the potential password group. So in two days, the attacker will discover your password.

If a service requires you to add a number to this password, you have cut the potential passwords to 41 percent. So the attack will last 34 hours, or a day and a half.


Abrams states that it is much better to choose a longer password:

Each additional character in a password effectively increases the pool of passwords. There are 6,5 million times more word combinations with 16 lowercase characters than there are eight character codes using all four character sets. This means 'toodlesmypoodles' is much harder to crack than 'I81B @ gle'

Of course after all the above you understand the value of using control δύο φάσεων (2FA).

___________________ The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive of new posts by email.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).